messages from 2020-12-13 00:28:17 to 2020-12-15 15:07:51 UTC [more...]
[PATCH v2 0/4] nbd/server: Quiesce coroutines on context switch
2020-12-15 15:01 UTC (9+ messages)
` [PATCH v2 1/4] block: Honor blk_set_aio_context() context requirements
` [PATCH v2 2/4] block: Avoid processing BDS twice in bdrv_set_aio_context_ignore()
` [PATCH v2 3/4] nbd/server: Quiesce coroutines on context switch
` [PATCH v2 4/4] block: Close block exports in two steps
[PATCH v2 00/12] x86: major paravirt cleanup
2020-12-15 15:07 UTC (7+ messages)
[PATCH] tools/xenstore: rework path length check
2020-12-15 15:06 UTC (2+ messages)
[PATCH v4 09/32] qdev: Make qdev_get_prop_ptr() get Object* arg
2020-12-15 14:24 UTC (12+ messages)
` [PATCH v4 23/32] qdev: Move dev->realized check to qdev_property_set()
` [PATCH v4 30/32] qdev: Rename qdev_get_prop_ptr() to object_field_prop_ptr()
[PATCH] xen: Rework WARN_ON() to return whether a warning was triggered
2020-12-15 14:01 UTC (6+ messages)
[PATCH v5 0/3] xen: add support for automatic debug key actions in case of crash
2020-12-15 13:59 UTC (8+ messages)
` [PATCH v5 1/3] xen/arm: add support for run_in_exception_handler()
` [PATCH v5 2/3] xen: enable keyhandlers to work without register set specified
` [PATCH v5 3/3] xen: add support for automatic debug key actions in case of crash
[ovmf test] 157549: regressions - FAIL
2020-12-15 13:07 UTC
Xen Security Advisory 348 v3 (CVE-2020-29566) - undue recursion in x86 HVM context switch code
2020-12-15 12:20 UTC
Xen Security Advisory 354 v4 (CVE-2020-29487) - XAPI: guest-triggered excessive memory usage
2020-12-15 12:20 UTC
Xen Security Advisory 359 v3 (CVE-2020-29571) - FIFO event channels control structure ordering
2020-12-15 12:20 UTC
Xen Security Advisory 353 v4 (CVE-2020-29479) - oxenstored: permissions not checked on root node
2020-12-15 12:20 UTC
Xen Security Advisory 356 v3 (CVE-2020-29567) - infinite loop when cleaning up IRQ vectors
2020-12-15 12:20 UTC
[GIT PULL] xen: branch for v5.11-rc1
2020-12-15 12:26 UTC
Xen Security Advisory 349 v3 (CVE-2020-29568) - Frontends can trigger OOM in Backends by update a watched path
2020-12-15 12:20 UTC
Xen Security Advisory 358 v4 (CVE-2020-29570) - FIFO event channels control block related ordering
2020-12-15 12:20 UTC
Xen Security Advisory 330 v3 (CVE-2020-29485) - oxenstored memory leak in reset_watches
2020-12-15 12:20 UTC
Xen Security Advisory 350 v4 (CVE-2020-29569) - Use after free triggered by block frontend in Linux blkback
2020-12-15 12:20 UTC
Xen Security Advisory 352 v3 (CVE-2020-29486) - oxenstored: node ownership can be changed by unprivileged clients
2020-12-15 12:20 UTC
Xen Security Advisory 325 v3 (CVE-2020-29483) - Xenstore: guests can disturb domain cleanup
2020-12-15 12:20 UTC
Xen Security Advisory 322 v4 (CVE-2020-29481) - Xenstore: new domains inheriting existing node permissions
2020-12-15 12:20 UTC
Xen Security Advisory 324 v3 (CVE-2020-29484) - Xenstore: guests can crash xenstored via watchs
2020-12-15 12:20 UTC
Xen Security Advisory 323 v3 (CVE-2020-29482) - Xenstore: wrong path length check
2020-12-15 12:20 UTC
Xen Security Advisory 115 v4 (CVE-2020-29480) - xenstore watch notifications lacking permission checks
2020-12-15 12:18 UTC
[PATCH v3 0/8] xen/arm: Add support for SMMUv3 driver
2020-12-15 11:35 UTC (13+ messages)
` [PATCH v3 7/8] "
[PATCH v2] xen/xenbus: make xs_talkv() interruptible
2020-12-15 11:10 UTC
[linux-linus test] 157538: regressions - FAIL
2020-12-15 10:57 UTC
xen/evtchn: Interrupt for port 34, but apparently not enabled; per-user 00000000a86a4c1b on 5.10
2020-12-15 10:20 UTC (3+ messages)
[xen-unstable test] 157536: regressions - FAIL
2020-12-15 10:19 UTC
[libvirt test] 157543: regressions - FAIL
2020-12-15 9:21 UTC
[PATCH 00/24] NetBSD fixes
2020-12-15 8:44 UTC (26+ messages)
` [PATCH 01/24] Fix lock directory path for NetBSD
` [PATCH 02/24] NetBSD doens't need xenbackendd with xl toolstack
` [PATCH 03/24] Fix lock directory path for NetBSD
` [PATCH 04/24] Make xg_main.c build on NetBSD
` [PATCH 05/24] Introduce locking functions for block device setup "
` [PATCH 06/24] Handle the case where vifname is not present in xenstore
` [PATCH 07/24] Remove NetBSD's system headers. We'll use the system-provided ones, which are up to date
` [PATCH 08/24] Make libs/call build on NetBSD
` [PATCH 09/24] Use xen/xenio.h "
` [PATCH 10/24] Make libs/evtchn build "
` [PATCH 11/24] Implement foreignmemory "
` [PATCH 12/24] Implement gnttab "
` [PATCH 13/24] Don't assume tv_sec is a unsigned long (for NetBSD)
` [PATCH 14/24] Pass bridge name to qemu and set XEN_DOMAIN_ID
` [PATCH 15/24] Make libs/light build on NetBSD
` [PATCH 16/24] Switch NetBSD to QEMU_XEN (!traditional)
` [PATCH 17/24] Make libs/light build on NetBSD
` [PATCH 18/24] xeneventchn_stubs.c doens't need xen/sys/evtchn.h (NetBSD fix)
` [PATCH 19/24] errno may not be a gobal R/W variable, use a local variable instead (fix build on NetBSD)
` [PATCH 20/24] If FILENAME_MAX is defined, use it instead of arbitrary value (fix format-truncation errors with GCC >= 7)
` [PATCH 21/24] Fix unused functions/variables error
` [PATCH 22/24] If PTHREAD_STACK_MIN is not defined, use DEFAULT_THREAD_STACKSIZE
` [PATCH 23/24] Use xen/xenio.h on NetBSD
` [PATCH 24/24] Fix error: array subscript has type 'char' [-Werror=char-subscripts]
[ovmf test] 157547: regressions - FAIL
2020-12-15 8:09 UTC
[qemu-mainline test] 157533: regressions - FAIL
2020-12-15 7:36 UTC
[ovmf test] 157545: regressions - FAIL
2020-12-15 6:39 UTC
[ovmf test] 157544: regressions - FAIL
2020-12-15 5:28 UTC
[ovmf test] 157542: regressions - FAIL
2020-12-15 4:42 UTC
[ovmf test] 157541: regressions - FAIL
2020-12-15 4:02 UTC
[ovmf test] 157540: regressions - FAIL
2020-12-15 3:30 UTC
Xen-ARM DomUs
2020-12-15 3:03 UTC (4+ messages)
[linux-linus test] 157529: regressions - FAIL
2020-12-15 2:56 UTC
[ovmf test] 157537: regressions - FAIL
2020-12-15 2:48 UTC
[PATCH] examples: Add PVH example to config example list
2020-12-15 2:35 UTC
[ovmf test] 157535: regressions - FAIL
2020-12-15 1:56 UTC
[ovmf test] 157531: regressions - FAIL
2020-12-15 0:50 UTC
[openxt-dev] Re: Follow up on libxl-fix-reboot.patch
2020-12-15 0:41 UTC (2+ messages)
[qemu-mainline test] 157526: regressions - FAIL
2020-12-14 23:57 UTC
[ovmf test] 157527: regressions - FAIL
2020-12-14 22:20 UTC
kexec not working in xen domU?
2020-12-14 20:08 UTC (2+ messages)
[patch 00/30] genirq: Treewide hunt for irq descriptor abuse and assorted fixes
2020-12-14 21:13 UTC (11+ messages)
` [patch 20/30] net/mlx4: Replace irq_to_desc() abuse
` [patch 21/30] net/mlx4: Use effective interrupt affinity
` [patch 22/30] net/mlx5: Replace irq_to_desc() abuse
` [patch 23/30] net/mlx5: Use effective interrupt affinity
[XEN PATCH v1 1/1] Invalidate cache for cpus affinitized to the domain
2020-12-14 19:36 UTC (8+ messages)
[linux-linus test] 157519: regressions - FAIL
2020-12-14 17:25 UTC
[PATCH v3 00/13] Remove GCC < 4.8 checks
2020-12-14 16:57 UTC (11+ messages)
` [PATCH v3 01/13] qemu/atomic: Drop special case for unsupported compiler
` [PATCH v3 03/13] compiler.h: remove GCC < 3 __builtin_expect fallback
` [PATCH v3 06/13] virtiofsd: replace _Static_assert with QEMU_BUILD_BUG_ON
` [PATCH v3 13/13] compiler.h: remove QEMU_GNUC_PREREQ
[ovmf test] 157525: regressions - FAIL
2020-12-14 16:28 UTC
[PATCH] x86/PV: guest_get_eff_kern_l1e() may still need to switch page tables
2020-12-14 16:07 UTC (3+ messages)
[qemu-mainline test] 157514: regressions - FAIL
2020-12-14 15:45 UTC
[ovmf test] 157521: regressions - FAIL
2020-12-14 15:34 UTC
[PATCH] Revert "x86/mm: drop guest_get_eff_l1e()"
2020-12-14 13:55 UTC (4+ messages)
[xen-unstable test] 157512: tolerable FAIL
2020-12-14 12:27 UTC
[PATCH v4 0/3] xen: add support for automatic debug key actions in case of crash
2020-12-14 11:59 UTC (21+ messages)
` [PATCH v4 1/3] xen/arm: add support for run_in_exception_handler()
` [PATCH v4 2/3] xen: enable keyhandlers to work without register set specified
` [PATCH v4 3/3] xen: add support for automatic debug key actions in case of crash
[ovmf test] 157513: regressions - FAIL
2020-12-14 11:06 UTC
[PATCH v3 0/5] evtchn: (not so) recent XSAs follow-on
2020-12-14 9:40 UTC (6+ messages)
` [PATCH v3 4/5] evtchn: convert domain event lock to an r/w one
[linux-linus test] 157509: regressions - FAIL
2020-12-14 8:27 UTC
[libvirt test] 157516: regressions - trouble: blocked/fail/pass/starved
2020-12-14 6:51 UTC
[qemu-mainline test] 157504: regressions - FAIL
2020-12-14 2:19 UTC
[ovmf test] 157510: regressions - FAIL
2020-12-14 1:42 UTC
[ovmf test] 157507: regressions - FAIL
2020-12-13 22:57 UTC
[linux-linus test] 157500: regressions - FAIL
2020-12-13 20:45 UTC
[ovmf test] 157501: regressions - FAIL
2020-12-13 18:22 UTC
[PATCH] hw/xen: Don't use '#' flag of printf format
2020-12-13 16:01 UTC (2+ messages)
[qemu-mainline test] 157487: regressions - FAIL
2020-12-13 14:56 UTC
[linux-linus test] 157479: regressions - FAIL
2020-12-13 12:07 UTC
[ovmf test] 157495: regressions - FAIL
2020-12-13 11:55 UTC
[xen-unstable test] 157476: regressions - FAIL
2020-12-13 11:09 UTC
[ovmf test] 157493: regressions - FAIL
2020-12-13 11:00 UTC
[xen-unstable-coverity test] 157492: all pass - PUSHED
2020-12-13 9:57 UTC
[ovmf test] 157490: regressions - FAIL
2020-12-13 9:41 UTC
[ovmf test] 157488: regressions - FAIL
2020-12-13 8:27 UTC
[ovmf test] 157486: regressions - FAIL
2020-12-13 7:25 UTC
[libvirt test] 157481: regressions - FAIL
2020-12-13 7:06 UTC
[qemu-mainline test] 157474: regressions - FAIL
2020-12-13 6:45 UTC
[ovmf test] 157485: regressions - FAIL
2020-12-13 6:27 UTC
[ovmf test] 157484: regressions - FAIL
2020-12-13 6:04 UTC
[ovmf test] 157482: regressions - FAIL
2020-12-13 5:15 UTC
[ovmf test] 157480: regressions - FAIL
2020-12-13 4:37 UTC
[ovmf test] 157478: regressions - FAIL
2020-12-13 3:53 UTC
[linux-linus test] 157466: regressions - FAIL
2020-12-13 3:24 UTC
[ovmf test] 157477: regressions - FAIL
2020-12-13 2:52 UTC
[ovmf test] 157473: regressions - FAIL
2020-12-13 1:55 UTC
[qemu-mainline test] 157463: regressions - FAIL
2020-12-13 1:09 UTC
[ovmf test] 157472: regressions - FAIL
2020-12-13 0:57 UTC
[ovmf test] 157469: regressions - FAIL
2020-12-13 0:27 UTC
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).